Content

Black Hat 2015: Researcher exploits Android bug to take complete control of device

Researchers with Check Point identified an Android vulnerability that can be exploited by an attacker to take complete control of almost any device running the popular mobile operating system. Not only can the attacker control the device, but they can spy on the user as well.

In this video, Avi Bashan, technology leader at Check Point, explains the issue and demonstrates exactly what an attacker can do if they successfully exploit the bug.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.